Your area of responsibility
Information Security
- Maintain the ISMS, risk register, controls, and policies.
- Lead risk assessments, control testing, corrective actions, and reviews.
- Coordinate with outsourced SOC/CISO for effective monitoring and incident response.
- Run tabletop exercises, post‑incident reviews, and maintain the IR plan.
- Operate and improve security across Defender, Entra ID, Intune, Purview, Sentinel, and M365.
- Manage conditional access, MFA, PIM, endpoint baselines, and secure configurations.
- Run a risk‑based vulnerability and patch program and track remediation with providers.
- Lead vendor due diligence, DPAs, and ongoing monitoring aligned to outsourcing procedures.
- Implement data classification, retention, and DLP; support privacy‑by‑design and coordinate with external DPO
- Support audits and regulatory reviews; deliver security awareness training and simulation campaigns.
- Maintain evidence, procedures, runbooks, and monthly security dashboards.